期刊:IEEE Transactions on Dependable and Secure Computing [Institute of Electrical and Electronics Engineers] 日期:2024-01-01卷期号:21 (1): 449-462被引量:2
标识
DOI:10.1109/tdsc.2023.3261328
摘要
Behavior recognition plays an essential role in numerous behavior-driven applications ( e . g ., virtual reality and smart home) and even in the security-critical applications ( e . g ., security surveillance and elder healthcare). Recently, WiFi-based behavior recognition (WBR) technique stands out among many behavior recognition techniques due to its advantages of being non-intrusive, device-free, and ubiquitous. However, existing WBR research mainly focuses on improving the recognition precision, while rarely studying the security aspects. In this paper, we reveal that WBR systems are vulnerable to manipulating physical signals. For instance, our observation shows that WiFi signals can be changed by jamming signals. By exploiting the vulnerability, we propose two approaches to generate physically online adversarial samples to perform untargeted attack and targeted attack, respectively. The effectiveness of these attacks are extensively evaluated over four real-world WBR systems. The experiment results show that our attack approaches can achieve 80% and 60% success rates for untargeted attack and targeted attack in physical world, respectively. We also show that our attack approaches can be generalized to other WiFi-based sensing applications, such as user authentication.